Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
42447fa47634362aeff2746d2ad7fe43.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42447fa47634362aeff2746d2ad7fe43.exe
Resource
win10v2004-20231215-en
General
-
Target
42447fa47634362aeff2746d2ad7fe43.exe
-
Size
11.4MB
-
MD5
42447fa47634362aeff2746d2ad7fe43
-
SHA1
e4c1aa0f40112f20e1f41f104d61a1ae265c29d4
-
SHA256
8d6d6e9a34683ac82b391d1725b233f7b4713978f6a3a528a2062425fb90f537
-
SHA512
5776f74befea8bbaa87495f57063bc417c7045f251d9f93aac59a10b9032210ccb7bea96dcf904c0ccc3528bb55c50d13451e5c58067aeb6b245d4195c2d3842
-
SSDEEP
49152:nGvEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE:nG
Malware Config
Extracted
tofsee
43.231.4.6
lazystax.ru
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 3664 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1852 sc.exe 3136 sc.exe 1644 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 836 2688 WerFault.exe 19 4496 740 WerFault.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\42447fa47634362aeff2746d2ad7fe43.exe"C:\Users\Admin\AppData\Local\Temp\42447fa47634362aeff2746d2ad7fe43.exe"1⤵PID:2688
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\rlvutgfn\2⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\iewuclog.exe" C:\Windows\SysWOW64\rlvutgfn\2⤵PID:1564
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create rlvutgfn binPath= "C:\Windows\SysWOW64\rlvutgfn\iewuclog.exe /d\"C:\Users\Admin\AppData\Local\Temp\42447fa47634362aeff2746d2ad7fe43.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:1852
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description rlvutgfn "wifi internet conection"2⤵
- Launches sc.exe
PID:3136
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start rlvutgfn2⤵
- Launches sc.exe
PID:1644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 5922⤵
- Program crash
PID:836
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:3664
-
-
C:\Windows\SysWOW64\rlvutgfn\iewuclog.exeC:\Windows\SysWOW64\rlvutgfn\iewuclog.exe /d"C:\Users\Admin\AppData\Local\Temp\42447fa47634362aeff2746d2ad7fe43.exe"1⤵PID:740
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 5122⤵
- Program crash
PID:4496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2688 -ip 26881⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 740 -ip 7401⤵PID:1152